8 | Contents Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User GuideIntrusion Detection System ..................................................................................................190Wireless Intrusion Detection System (WIDS) Event Reporting to Dell PowerConnect W-AirWave ...................................................................................................................................190RF Visualization Support for Dell Instant ............................................................................191Configuring Dell PowerConnect W-AirWave ............................................................................191Creating your Organization String .......................................................................................191About Shared Key...................................................................................................................192Entering the Organization String and AMP Information into the IAP ....................192Dell PowerConnect W-AirWave Discovery through DHCP Option................................192Standard DHCP option 60 and 43 on Windows Server 2008 ...................................192Alternate method for defining Vendor Specific DHCP options.......................................195Chapter 24 Monitoring ........................................................................................................................ 199Virtual Controller View...................................................................................................................199Monitoring Link .......................................................................................................................200Info ............................................................................................................................................200RF Dashboard..........................................................................................................................200Usage Trends ..........................................................................................................................200Client Alerts Link.....................................................................................................................202IDS Link ....................................................................................................................................202Network View..................................................................................................................................202Info ............................................................................................................................................203Usage Trends ..........................................................................................................................203Instant Access Point View............................................................................................................204Info ............................................................................................................................................205RF Dashboard..........................................................................................................................205Overview ..................................................................................................................................205Client View.......................................................................................................................................212Info ............................................................................................................................................213RF Dashboard..........................................................................................................................213RF Trends .................................................................................................................................213Mobility Trail............................................................................................................................216Chapter 25 Alert Types and Management....................................................................................... 217Alert Types.......................................................................................................................................217Chapter 26 Policy Enforcement Firewall.......................................................................................... 219Authentication Servers..................................................................................................................219Users for Internal Server...............................................................................................................220Roles .................................................................................................................................................220Extended Voice and Video Functionalities.........................................................................221QoS for Microsoft Office OCS and Apple Facetime..................................................221Client Blacklisting...........................................................................................................................223Types of Client Blacklisting...........................................................................................................224Manual Blacklisting ...............................................................................................................224Adding a Client to the Manual Blacklist .....................................................................224Dynamic Blacklisting .............................................................................................................225Authentication Failure Blacklisting .............................................................................225Session Firewall Based Blacklisting...........................................................................225PEF Settings.....................................................................................................................................225Firewall ALG Configuration ...................................................................................................225Firewall-based Logging .........................................................................................................226Chapter 27 VPN Configuration........................................................................................................... 227